The latest Information Security news relevant to Information Security Leaders.

Information security A practical guide to busting the “perfect security” myth

There’s no such thing as “perfect security” just like there’s no such thing as a “real” unicorn. Most people have …

Information security Redefining security for real-time enterprise in 2019

Last year was a year of digital acceleration, as new technologies such as 5G, artificial intelligence and next-gen cloud moved …

Information security What the InfoSec C-Suite needs to know about Document Management Systems

Aaron Rangel, Director of Product Management, iManage, outlines the types of attacks that DMS systems are susceptible to, as well …

Information security UK government to introduce new regulations to make IoT products secure by design

The government has launched fresh consultations as a prelude to a new regulatory framework that will make it mandatory for …

Information security Lagging behind: why government organisations need to upgrade their email security

Maor Hizkiev, CTO and co-founder, BitDam, explains how and why government organisations are lagging behind in implementing standard email security …

Information security What does an effective strategy for encryption entail?

Simon Keates, Business Development Director, EMEA at Thales eSecurity, highlights what the best approach for an effective encryption strategy is …

Information security How to tackle device authentication and data security in the healthcare industry

John Grimm, Senior Director of Strategy and Business Development at nCipher Security, discusses the steps healthcare providers and device manufacturers …

Information security How to use deception to gain the advantage over cyber-attackers

Tricking the trickster? Carolyn Crandall, Chief Deception Officer at Attivo Networks, shows us how to turn the attackers' techniques against them. …

Information security The five most common social engineering attacks targeting your Wi-Fi

Tal Shabi, Software Engineer at Imperva, outlines the top five most common social engineering attacks and how your business can …

Information security How to protect your digital assets by achieving full visibility

Eoin Keary, CEO and co-founder of edgescan, discusses why organisations are still failing to get the fundamentals of security right. …

Information security How can we define risk in cyber insurance?

Matthew McKenna, VP EMEA at SecurityScorecard, discusses the ever-growing popularity of cyber insurance and how security ratings can be used …

Information security Password security: how does your organisation compare to others?

By Gerald Beuchelt, CISO at LogMeIn, says that businesses are struggling to quantify their own level of password risk, even …